Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kde 3.5.3 vulnerabilities and exploits
(subscribe to this query)
4
CVSSv2
CVE-2006-2449
KDE Display Manager (KDM) in KDE 3.2.0 up to 3.5.3 allows local users to read arbitrary files via a symlink attack related to the session type for login.
Kde Kde 3.2.2
Kde Kde 3.2.3
Kde Kde 3.4.3
Kde Kde 3.5
Kde Kde 3.2
Kde Kde 3.2.1
Kde Kde 3.4.1
Kde Kde 3.4.2
Kde Kde 3.3
Kde Kde 3.3.1
Kde Kde 3.5.2
Kde Kde 3.5.3
Kde Kde 3.3.2
Kde Kde 3.4
6.8
CVSSv2
CVE-2007-4569
backend/session.c in KDM in KDE 3.3.0 up to and including 3.5.7, when autologin is configured and "shutdown with password" is enabled, allows remote malicious users to bypass the password requirement and login to arbitrary accounts via unspecified vectors.
Kde Kde 3.4.0
Kde Kde 3.4.1
Kde Kde 3.5.3
Kde Kde 3.5.4
Kde Kde 3.3.1
Kde Kde 3.3.2
Kde Kde 3.4
Kde Kde 3.5.1
Kde Kde 3.5.2
Kde Kde 3.4.2
Kde Kde 3.4.3
Kde Kde 3.5.5
Kde Kde 3.5.6
Kde Kde 3.3
Kde Kde 3.3.0
Kde Kde 3.5
Kde Kde 3.5.0
Kde Kde 3.5.7
5
CVSSv2
CVE-2012-4514
rendering/render_replaced.cpp in Konqueror in KDE prior to 4.9.3 allows remote malicious users to cause a denial of service (NULL pointer dereference) via a crafted web page, related to "trying to reuse a frame with a null part."
Kde Kde 3.2.1
Kde Kde 3.2.3
Kde Kde 3.1.1
Kde Kde 3.1.2
Kde Kde 3.5
Kde Kde 3.3.x
Kde Kde 1.1
Kde Kde 4.7.3
Kde Kde 2.2
Kde Kde 1.x
Kde Kde 3.5.7
Kde Kde 2.0.1
Kde Kde 3.0.5
Kde Kde 3.1 Beta2
Kde Kde 3.0.1
Kde Kde 3.0
Kde Kde 3.0.2
Kde Kde
Kde Kde 3.1.5
Kde Kde 3.1.4
Kde Kde 3.2.0
Kde Kde 3.2
1 EDB exploit
7.5
CVSSv2
CVE-2004-0803
Multiple vulnerabilities in the RLE (run length encoding) decoders for libtiff 3.6.1 and previous versions, related to buffer overflows and integer overflows, allow remote malicious users to execute arbitrary code via TIFF files.
Libtiff Libtiff 3.4
Libtiff Libtiff 3.5.1
Libtiff Libtiff 3.5.2
Pdflib Pdf Library 5.0.2
Wxgtk2 Wxgtk2 2.5 .0
Libtiff Libtiff 3.6.0
Libtiff Libtiff 3.6.1
Libtiff Libtiff 3.5.3
Libtiff Libtiff 3.5.4
Libtiff Libtiff 3.5.5
Libtiff Libtiff 3.5.7
Apple Mac Os X 10.2.5
Apple Mac Os X 10.2.6
Apple Mac Os X 10.3.5
Apple Mac Os X 10.3.6
Apple Mac Os X Server 10.2.6
Apple Mac Os X Server 10.2.7
Apple Mac Os X Server 10.3.5
Apple Mac Os X Server 10.3.6
Mandrakesoft Mandrake Linux 10.0
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 3.0
5
CVSSv2
CVE-2004-0886
Multiple integer overflows in libtiff 3.6.1 and previous versions allow remote malicious users to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.
Libtiff Libtiff 3.5.1
Libtiff Libtiff 3.5.2
Pdflib Pdf Library 5.0.2
Wxgtk2 Wxgtk2
Libtiff Libtiff 3.5.3
Libtiff Libtiff 3.5.4
Wxgtk2 Wxgtk2 2.5 .0
Libtiff Libtiff 3.5.5
Libtiff Libtiff 3.5.7
Libtiff Libtiff 3.4
Libtiff Libtiff 3.6.0
Libtiff Libtiff 3.6.1
Apple Mac Os X 10.2.4
Apple Mac Os X 10.2.5
Apple Mac Os X 10.3.4
Apple Mac Os X 10.3.5
Apple Mac Os X Server 10.2.5
Apple Mac Os X Server 10.2.6
Apple Mac Os X Server 10.3.4
Apple Mac Os X Server 10.3.5
Mandrakesoft Mandrake Linux 10.0
Redhat Enterprise Linux 3.0
6.8
CVSSv2
CVE-2009-0689
Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x pr...
Freebsd Freebsd 6.4
Openbsd Openbsd 4.5
Netbsd Netbsd 5.0
Mozilla Firefox 3.0.2
Mozilla Firefox 3.0.3
Mozilla Firefox 3.5
Mozilla Firefox 3.5.1
Freebsd Freebsd 7.2
Mozilla Firefox 3.0.13
Mozilla Firefox 3.0.14
Mozilla Firefox 3.0.8
Mozilla Firefox 3.0.9
Mozilla Firefox 3.0.11
Mozilla Firefox 3.0.12
Mozilla Firefox 3.0.6
Mozilla Firefox 3.0.7
K-meleon Project K-meleon 1.5.3
Mozilla Seamonkey 1.1.8
Mozilla Firefox 3.0.1
Mozilla Firefox 3.0.10
Mozilla Firefox 3.0.4
Mozilla Firefox 3.0.5
11 EDB exploits
1 Github repository
4.6
CVSSv2
CVE-2002-0838
Buffer overflow in (1) gv 3.5.8 and previous versions, (2) gvv 1.0.2 and previous versions, (3) ggv 1.99.90 and previous versions, (4) gnome-gv, and (5) kghostview in kdegraphics 2.2.2 and previous versions, allows malicious users to execute arbitrary code via a malformed (a) PDF...
Gv Gv 2.7.6
Gv Gv 2.7b1
Gv Gv 3.0.4
Gv Gv 3.1.4
Gv Gv 3.5.8
Ggv Ggv 1.0.2
Gv Gv 2.7b2
Gv Gv 2.7b3
Gv Gv 3.1.6
Gv Gv 3.2.4
Ghostview Ghostview 1.4.1
Ghostview Ghostview 1.5
Gv Gv 2.9.4
Gv Gv 3.0.0
Gv Gv 3.4.3
Gv Gv 3.5.2
Gv Gv 3.5.3
Ghostview Ghostview 1.3
Ghostview Ghostview 1.4
Gv Gv 2.7b4
Gv Gv 2.7b5
Gv Gv 3.4.12
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-34377
CVE-2024-20859
CVE-2023-49606
inject
arbitrary
CVE-2024-33788
CVE-2024-30973
IDOR
CVE-2024-33907
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started